First published: Tue Jan 14 2020(Updated: )
Undisclosed traffic patterns received may cause a disruption of service to the Traffic Management Microkernel (TMM). This vulnerability affects TMM through a virtual server configured with a FastL4 profile. Traffic processing is disrupted while TMM restarts. This issue only impacts specific engineering hotfixes. NOTE: This vulnerability does not affect any of the BIG-IP major, minor or maintenance releases you obtained from downloads.f5.com. The affected Engineering Hotfix builds are as follows: Hotfix-BIGIP-14.1.2.1.0.83.4-ENG Hotfix-BIGIP-12.1.4.1.0.97.6-ENG Hotfix-BIGIP-11.5.4.2.74.291-HF2
Credit: f5sirt@f5.com
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP Local Traffic Manager | =11.5.4.2.74.291 | |
F5 BIG-IP Local Traffic Manager | =12.1.4.1.0.97.6 | |
F5 BIG-IP Local Traffic Manager | =14.1.2.1.0.83.4 | |
F5 BIG-IP Advanced Firewall Manager | =11.5.4.2.74.291 | |
F5 BIG-IP Advanced Firewall Manager | =12.1.4.1.0.97.6 | |
F5 BIG-IP Advanced Firewall Manager | =14.1.2.1.0.83.4 | |
f5 big-ip application acceleration manager | =11.5.4.2.74.291 | |
f5 big-ip application acceleration manager | =12.1.4.1.0.97.6 | |
f5 big-ip application acceleration manager | =14.1.2.1.0.83.4 | |
F5 BIG-IP Analytics | =11.5.4.2.74.291 | |
F5 BIG-IP Analytics | =12.1.4.1.0.97.6 | |
F5 BIG-IP Analytics | =14.1.2.1.0.83.4 | |
F5 BIG-IP Access Policy Manager | =11.5.4.2.74.291 | |
F5 BIG-IP Access Policy Manager | =12.1.4.1.0.97.6 | |
F5 BIG-IP Access Policy Manager | =14.1.2.1.0.83.4 | |
F5 BIG-IP Application Security Manager | =11.5.4.2.74.291 | |
F5 BIG-IP Application Security Manager | =12.1.4.1.0.97.6 | |
F5 BIG-IP Application Security Manager | =14.1.2.1.0.83.4 | |
f5 big-ip edge gateway | =11.5.4.2.74.291 | |
f5 big-ip edge gateway | =12.1.4.1.0.97.6 | |
f5 big-ip edge gateway | =14.1.2.1.0.83.4 | |
f5 big-ip fraud protection service | =11.5.4.2.74.291 | |
f5 big-ip fraud protection service | =12.1.4.1.0.97.6 | |
f5 big-ip fraud protection service | =14.1.2.1.0.83.4 | |
F5 BIG-IP Global Traffic Manager | =11.5.4.2.74.291 | |
F5 BIG-IP Global Traffic Manager | =12.1.4.1.0.97.6 | |
F5 BIG-IP Global Traffic Manager | =14.1.2.1.0.83.4 | |
f5 big-ip link controller | =11.5.4.2.74.291 | |
f5 big-ip link controller | =12.1.4.1.0.97.6 | |
f5 big-ip link controller | =14.1.2.1.0.83.4 | |
F5 BIG-IP Policy Enforcement Manager | =11.5.4.2.74.291 | |
F5 BIG-IP Policy Enforcement Manager | =12.1.4.1.0.97.6 | |
F5 BIG-IP Policy Enforcement Manager | =14.1.2.1.0.83.4 | |
F5 BIG-IP WebAccelerator | =11.5.4.2.74.291 | |
F5 BIG-IP WebAccelerator | =12.1.4.1.0.97.6 | |
F5 BIG-IP WebAccelerator | =14.1.2.1.0.83.4 | |
f5 big-ip domain name system | =11.5.4.2.74.291 | |
f5 big-ip domain name system | =12.1.4.1.0.97.6 | |
f5 big-ip domain name system | =14.1.2.1.0.83.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-5852.
The severity of CVE-2020-5852 is high with a severity value of 7.5.
CVE-2020-5852 affects F5 Big-IP Local Traffic Manager versions 11.5.4.2.74.291, 12.1.4.1.0.97.6, and 14.1.2.1.0.83.4, as well as other F5 products.
CVE-2020-5852 can cause a disruption of service to the Traffic Management Microkernel (TMM) due to undisclosed traffic patterns received.
Yes, F5 has released a security advisory with instructions on how to mitigate the vulnerability. Please refer to the official F5 support article for more information.